Information Security and Computer Forensics, ISCF

Vision

The ABISCF facilitates a common understanding of standards, in the areas of information security and digital forensics, through training and credentialing programs established under the American Board for Certification in Homeland Security (ABCHS) to support Homeland Security Initiatives.

Mission

Our mission is to provide information security and computer forensics practitioners in the private, NGO and government sectors with training and/or certification to facilitate their knowledge and growth to support the current prescribed response frameworks.
In pursuing the mission our goals are to:

Provide a certification framework to serve as the standard in both information security and computer forensics.

Provide written and practical tests to ensure uniformity in standards for performance across all levels.

Establish and provide training to agencies and organizations that do not have expertise or resources to do it themselves.

Establish and provide an open and engaging communications process between the organization, its members, potential members and certification candidates.

News & Updates

CYBERSECURITY: Threats Impacting the Nation

The nation faces an evolving array of cyber-based threats arising from a variety of sources. These threats can be intentional or unintentional. Unintentional threats can be caused by software upgrades or defective equipment that inadvertently disrupt systems, and intentional threats can be both targeted and untargeted attacks from a variety of threat sources. Sources of threats include criminal groups, hackers, terrorists, organization insiders, and foreign nations engaged in crime, political activism, or espionage and information warfare. These threat sources vary in terms of the capabilities of the actors, their willingness to act, and their motives, which can include monetary gain or political advantage, among others. Moreover, potential threat actors have a variety of attack techniques at their disposal, which can adversely affect computers, software, a network, an organization's operation, an industry, or the Internet itself. The nature of cyber attacks can vastly enhance their reach and impact due to the fact that attackers do not need to be physically close to their victims and can more easily remain anonymous, among other things. The magnitude of the threat is compounded by the ever-increasing sophistication of cyber attack techniques, such as attacks that may combine multiple techniques. Using these techniques, threat actors may target individuals, businesses, critical infrastructures, or government organizations.